Hands on with Microsoft’s updated Zero Trust Assessment tool

Recently Merill Fernando announced an update to Microsoft’s Zero Trust Assessment script. The script/tool checks your tenant configuration and recommends ways to improve security.

I’ve had a play with this to see how easy it is to run, and what the outputs look like. There’s good news ahead.

Prerequisites

  • PowerShell 7.
  • To connect and consent to the required permissions the first time, you need to be a Global Administrator.
  • If you installed a previous version of the Zero Trust Assessment, uninstall it before continuing.

Install the PowerShell modules

Open a PowerShell 7 prompt and run; Install-Module ZeroTrustAssessment -Scope CurrentUser

Afterwhich, run Connect-ZtAssessment. Depending on your level of Graph Powershell access, you may be required to consent to some app permissions. This is a one-time configuration, and future connections will connect without requesting consent.

After granting the necessary Microsoft Graph PowerShell permissions, you’ll need to authenticate against your Azure platform. Once connected, simply run Invoke-ZtAssessment (You can specify the path to which the output will be recorded if you wish, Invoke-ZtAssessment -Path C:\Temp\MyZTAssessment)

The script will then run, and depending on the size of the estate could take some time.

After the export completes, you’ll be presented with a beautiful looking report, which is high level enough to present to execs, but also, contains detail for your IT colleagues to take actions from.

Each of these actions within the results table, is clickable, and will provide you with remediation actions (if required). Much like those in Security Center and the likes.

So, with all that, I would say, presuming you have permission to do so. Run this against your environment and see what comes back.

James avatar

Leave a Reply

Your email address will not be published. Required fields are marked *